Sciweavers

1610 search results - page 264 / 322
» Identity Based Multisignatures
Sort
View
ESAW
2008
Springer
13 years 11 months ago
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Yves Demazeau, Olivier Boi...
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 11 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
CRITIS
2007
13 years 11 months ago
An Analysis of Cyclical Interdependencies in Critical Infrastructures
Abstract In this paper we discuss the properties and algorithmic methods for the identification and classification of cyclical interdependencies in critical infrastructures based...
Nils Kalstad Svendsen, Stephen D. Wolthusen
BILDMED
2007
148views Algorithms» more  BILDMED 2007»
13 years 11 months ago
Bayesian Vessel Extraction for Planning of Radiofrequency-Ablation
The software-assisted planning of radiofrequency-ablation of liver tumors calls for robust and fast methods to segment the tumor and surrounding vascular structures from clinical d...
Stephan Zidowitz, Johann Drexl, Tim Kröger, T...
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 11 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...